16

I have a problem in a single computer trying to do a process I've successfully done on another computers.

What I have successfully achieved on another computers:

  1. Have a non TPM compatible module featuring computer with Windows 10 Pro installed.
  2. Try to enable BitLocker on C:
  3. Windows complains about not having a compatible TPM module.
  4. Disable that requirement from Group Policy, reboot and retry.
  5. Through the BitLocker wizard, Windows asks you for the unlocking method, then I choose the one I prefer - password, which doesn't mean PIN nor USB drive -, then enter my custom password, then the wizard oblies me to save a recovery file somewhere, and it finally commits the options.
  6. The cyphering process goes on.
  7. At next boot, I must enter a password.

What is happening to me on a laptop with Windows 10:

  1. Try to enable BitLocker on C:
  2. Windows complains about not having a compatible TPM module.
  3. Disable that requirement from Group Policy, reboot and retry.
  4. Through the BitLocker wizard, Windows doesn't ask me for any unlocking method, it just goes to the screen where I must save a recovery file somewhere, and then it offers to commit the options.

I have no choice to choose password unlocking nor to enter any custom password, so I am not commiting the wizard. What can I do so Windows shows me the password input option? Am I doing anything wrong or different?

Lots of thanks in advance.

NOTE: please, the reason why I am preferring password unlocking is out of topic.

2
  • Save the recovery file somewhere and then it should work.
    – Overmind
    Commented Jun 12, 2017 at 9:10
  • I have a laptop with TPM and I was also not prompted to enter password or using USB disk, so it's very likely that your laptop actually has a compatible TPM but the Group Policy was just messed up. You can see my answer for what I have found.
    – WorldFS
    Commented Aug 17, 2019 at 11:49

2 Answers 2

13

We'll actually look at a couple settings, make sure you have the following set, to completely disable TPM management and key use, and resort to password.

  1. Open gpedit.msc.
  2. Navigate to Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionOperating System Drives.
  3. Set the following policy options:
    1. Require additional authentication at startup:
      1. Enabled.
      2. Allow BitLocker without a compatible TPM: Checked
      3. Configure TPM startup: Do not allow TPM
      4. Configure TPM startup PIN: Require startup PIN with TPM
      5. Configure TPM startup key: Do not allow startup key with TPM
      6. Configure TPM startup key and PIN: Do not allow startup key and PIN with TPM
    2. Allow enhanced PINs for startup: Enabled
    3. Configure use of passwords for operating system drives:
      1. Enabled
      2. Configure password complexity for operating system drives: Allow password complexity

enter image description here enter image description here enter image description here

And for non-system drives, be sure to have the following checkbox set:

  1. Navigate to Fixed Data Drives.
  2. Configure use of passwords for fixed data drives
    1. Enabled
    2. Require password for fixed data drive: Checked

enter image description here

I think that about covers it. It should now give you the option for password input. It also should work with strong passwords, and at startup. Hope this helps!

2
  • Is it possible to use password instead of TPM, but I don't want to input the password on every boot just when I have to do some repairs on the system drive let's say from the recovery environment? Commented Feb 4 at 13:51
  • I used this method and it worked, except with a 20 character limit on the enhanced PIN. This answer helped me replace the PIN with a password/passphrase: superuser.com/a/1734210/1029778 but I replaced -TPMandPIN with -password
    – efesar
    Commented May 16 at 22:04
2

This article describes how to enable password encryption for BitLocker https://appuals.com/how-to-encrypt-system-partition-by-using-bitlocker-without-tpm/

tl;dr: Edit group policy Computer Configuration/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drive/Require additional authentication at startup, click Enabled, click Allow Bitlocker without compatible TPM chip checkbox in this group policy setting, and save.

However, if your computer has a TPM module, you'll notice that you can only choose PIN, USB Drive, or no additional authentication. The "PIN" option here means using TPM+PIN, it's not the same as just using password without TPM.

To actually enable password option like you had in non-TPM computers, you need to disable TPM in bios setting. How do to that or if you can do that depends on which motherboard / laptop you have.

Quoting from the description in group policy Computer Configuration/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drive/Require additional authentication at startup:

If you want to use BitLocker on a computer without a TPM, select the "Allow BitLocker without a compatible TPM" check box. In this mode either a password or a USB drive is required for start-up.

...

On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require insertion of a USB flash drive containing a startup key, the entry of a 6-digit to 20-digit personal identification number (PIN), or both.

From my understanding, you can't use password if Windows detects your computer has TPM, it forces you to use a method that involves TPM in this case, so you have to disable TPM module in order to use password encryption.

I have tested on a MSI P65 laptop which has a TPM Module, after disabling TPM Module in BIOS setting and enabling the group policy option, I can choose password as encryption method when setting up BitLocker.

Note: you might also want to disable hardware encryption (for both Operating System Drive and Fixed Data Drives: https://www.howtogeek.com/fyi/you-cant-trust-bitlocker-to-encrypt-your-ssd-on-windows-10/amp/

3
  • 3
    The GUI may not allow it, but it is still possible to set a password through the command line, i.e. using manage-bde.exe -on C: -password.
    – tomasz86
    Commented Apr 13, 2021 at 7:38
  • @tomasz86 This doesn't seem to work if bitlocker is already enabled in c: Commented Feb 4 at 12:16
  • @RicardoBohner In that case, you should be able to just add another protector, e.g. manage-bde -protectors -add c: -password.
    – tomasz86
    Commented Feb 5 at 15:33

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .